US DoJ Seizes Tai Chang Scam Compound Domain Used in Cryptocurrency Fraud
- OpusDatum

- 5 days ago
- 3 min read

The Justice Department has announced the seizure of tickmilleas.com, a fraudulent web domain linked to the Tai Chang scam compound in Kyaukhat, Burma. The site posed as a legitimate cryptocurrency investment platform and was used to lure victims into depositing their funds, which were then diverted through sophisticated fraud and money laundering schemes. The action forms part of the accelerating crackdown on cryptocurrency investment fraud, a threat that continues to generate enormous losses for individuals and financial institutions.
The Tai Chang compound, also known as Casino Kosai, is tied to organised crime networks including the Democratic Karen Benevolent Army and Trans Asia International Holding Group Thailand Company Limited. Both were designated as specially designated nationals on 12 November for their involvement in building and operating scam centres across Southeast Asia. These centres have emerged as major hubs for crypto-enabled fraud, human trafficking, and transnational money laundering. By seizing the domain, the Department of Justice aims to prevent US digital infrastructure from supporting international criminal operations.
According to the supporting affidavit, victims were shown fabricated trading dashboards displaying false returns and supposed top-ups by the scammers. Despite being registered only in early November 2025, tickmilleas.com had already been used to defraud multiple victims. Once users attempted to withdraw funds, they found themselves locked out, while their money had already been transferred through networks controlled by the Tai Chang syndicate. A law enforcement splash page now replaces the website content, disrupting active scam activity and signalling to would-be victims that the fraud has been halted.
A notable feature of this operation is the convergence of fraudulent websites with mobile applications distributed through mainstream platforms. The domain directed users to download apps from Google Play and the Apple App Store, enabling scammers to deepen the deception and bypass traditional browser-based scrutiny. Following FBI notification, both companies voluntarily removed several of the fraudulent applications. Meta also identified and removed more than 2,000 associated accounts from its platforms, demonstrating the scale of the infrastructure used to target victims through social engineering and unsolicited outreach.
Cryptocurrency investment fraud continues to escalate at alarming levels. The FBI’s Internet Crime Complaint Center received more than 41,000 complaints in 2024 alone, representing approximately $5.8 billion in losses. These scams often begin with unsolicited contact through dating apps, social media, messaging platforms, or text messages. Scammers build trust and emotional leverage before directing victims to deposit funds into fraudulent investment platforms. These schemes, particularly those run from Southeast Asian compounds, are increasingly reliant on detailed relationship-building, convincing documentation, and the illusion of legitimate trading activity.
The seizure forms part of a wider effort by the District of Columbia US Attorney’s Office’s Scam Center Strike Force, launched less than three weeks earlier. The Strike Force brings together the US Attorney’s Office, the Department of Justice’s Criminal Division, the FBI, the US Secret Service, and the US Attorney’s Office for the District of Rhode Island. The initiative benefits from FBI agents deployed to Bangkok specifically to counter the growth of scam compounds in Burma and beyond, marking a significant shift toward proactive disruption of organised fraud networks.
The Criminal Division’s Computer Crime and Intellectual Property Section continues to play a central role. Since 2020, it has secured convictions for over 180 cybercriminals and recovered more than $350 million for victims. Its collaborative approach with domestic and international law enforcement underscores the increasing necessity of cross-border intelligence and coordinated enforcement in combating digital financial crime.
For financial institutions and compliance professionals, the case highlights several critical risks. These include the abuse of mainstream app stores for fraud delivery, the role of social media ecosystems in victim targeting, and the complex laundering of proceeds through multi-jurisdictional channels linked to organised crime. With scam compounds operating on industrial scale, domain seizures and collaborative enforcement represent essential tools in constraining their reach. Yet the volume of CIF activity suggests that robust monitoring, threat intelligence, and public awareness remain paramount to preventing further victimisation.
Read the press release here.
%20-%20C.png)

